Login / Signup

A Graph-based Methodology for Analyzing IP Spoofing Attack.

Voravud SantiraveewanYongyuth Permpoontanalarp
Published in: AINA (2) (2004)
Keyphrases
  • design methodology
  • information systems
  • semi supervised
  • ddos attacks
  • database
  • image segmentation
  • countermeasures
  • application layer